ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1609.02943
  4. Cited By
Stealing Machine Learning Models via Prediction APIs

Stealing Machine Learning Models via Prediction APIs

9 September 2016
Florian Tramèr
Fan Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
    SILM
    MLAU
ArXivPDFHTML

Papers citing "Stealing Machine Learning Models via Prediction APIs"

50 / 351 papers shown
Title
Privacy-Preserving Collaborative Deep Learning with Unreliable
  Participants
Privacy-Preserving Collaborative Deep Learning with Unreliable Participants
Lingchen Zhao
Qian Wang
Qin Zou
Yan Zhang
Yanjiao Chen
FedML
21
9
0
25 Dec 2018
Achieving Data Truthfulness and Privacy Preservation in Data Markets
Achieving Data Truthfulness and Privacy Preservation in Data Markets
Chaoyue Niu
Zhenzhe Zheng
Fan Wu
Xiaofeng Gao
Guihai Chen
11
44
0
08 Dec 2018
Comprehensive Privacy Analysis of Deep Learning: Passive and Active
  White-box Inference Attacks against Centralized and Federated Learning
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning
Milad Nasr
Reza Shokri
Amir Houmansadr
FedML
MIACV
AAML
13
244
0
03 Dec 2018
Model-Reuse Attacks on Deep Learning Systems
Model-Reuse Attacks on Deep Learning Systems
Yujie Ji
Xinyang Zhang
S. Ji
Xiapu Luo
Ting Wang
SILM
AAML
136
186
0
02 Dec 2018
MOBIUS: Model-Oblivious Binarized Neural Networks
MOBIUS: Model-Oblivious Binarized Neural Networks
Hiromasa Kitai
Jason Paul Cruz
Naoto Yanai
Naohisa Nishida
Tatsumi Oba
Yuji Unagami
Tadanori Teruya
Nuttapong Attrapadung
Takahiro Matsuda
Goichiro Hanaoka
24
7
0
29 Nov 2018
Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted
  Inference
Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference
Edward Chou
Josh Beal
Daniel Levy
Serena Yeung
Albert Haque
Li Fei-Fei
32
198
0
25 Nov 2018
FALCON: A Fourier Transform Based Approach for Fast and Secure
  Convolutional Neural Network Predictions
FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions
Shaohua Li
Kaiping Xue
Chenkai Ding
Xindi Gao
David S. L. Wei
Tao Wan
F. Wu
30
68
0
20 Nov 2018
A First Look at Deep Learning Apps on Smartphones
A First Look at Deep Learning Apps on Smartphones
Mengwei Xu
Jiawei Liu
Yuanqiang Liu
F. Lin
Yunxin Liu
Xuanzhe Liu
HAI
33
179
0
08 Nov 2018
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning
K. Makarychev
Pascal Dupré
Yury Makarychev
Giancarlo Pellegrino
Dan Boneh
AAML
29
64
0
08 Nov 2018
Exploring Connections Between Active Learning and Model Extraction
Exploring Connections Between Active Learning and Model Extraction
Varun Chandrasekaran
Kamalika Chaudhuri
Irene Giacomelli
Shane Walker
Songbai Yan
MIACV
16
157
0
05 Nov 2018
Active Deep Learning Attacks under Strict Rate Limitations for Online
  API Calls
Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls
Guofu Li
Y. Sagduyu
Kemal Davaslioglu
Jason H. Li
AAML
21
31
0
05 Nov 2018
QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural
  Network against Adversarial Attacks
QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks
Faiq Khalid
Hassan Ali
Hammad Tariq
Muhammad Abdullah Hanif
Semeen Rehman
Rehan Ahmed
Mohamed Bennai
AAML
MQ
35
37
0
04 Nov 2018
What made you do this? Understanding black-box decisions with sufficient
  input subsets
What made you do this? Understanding black-box decisions with sufficient input subsets
Brandon Carter
Jonas W. Mueller
Siddhartha Jain
David K Gifford
FAtt
42
77
0
09 Oct 2018
Security Analysis of Deep Neural Networks Operating in the Presence of
  Cache Side-Channel Attacks
Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks
Sanghyun Hong
Michael Davinroy
Yigitcan Kaya
S. Locke
Ian Rackow
Kevin Kulda
Dana Dachman-Soled
Tudor Dumitras
MIACV
25
90
0
08 Oct 2018
Explainable Black-Box Attacks Against Model-based Authentication
Explainable Black-Box Attacks Against Model-based Authentication
Washington Garcia
Joseph I. Choi
S. K. Adari
S. Jha
Kevin R. B. Butler
26
10
0
28 Sep 2018
Actionable Recourse in Linear Classification
Actionable Recourse in Linear Classification
Berk Ustun
Alexander Spangher
Yang Liu
FaML
45
539
0
18 Sep 2018
Why Do Adversarial Attacks Transfer? Explaining Transferability of
  Evasion and Poisoning Attacks
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks
Ambra Demontis
Marco Melis
Maura Pintor
Matthew Jagielski
Battista Biggio
Alina Oprea
Cristina Nita-Rotaru
Fabio Roli
SILM
AAML
19
11
0
08 Sep 2018
Adversarial Attacks Against Automatic Speech Recognition Systems via
  Psychoacoustic Hiding
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding
Lea Schonherr
Katharina Kohls
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
33
288
0
16 Aug 2018
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN
  Architectures
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures
Mengjia Yan
Christopher W. Fletcher
Josep Torrellas
MIACV
FedML
37
246
0
14 Aug 2018
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service
L. Hanzlik
Yang Zhang
Kathrin Grosse
A. Salem
Maximilian Augustin
Michael Backes
Mario Fritz
OffRL
24
103
0
01 Aug 2018
Model Reconstruction from Model Explanations
Model Reconstruction from Model Explanations
S. Milli
Ludwig Schmidt
Anca Dragan
Moritz Hardt
FAtt
21
177
0
13 Jul 2018
Confidential Inference via Ternary Model Partitioning
Confidential Inference via Ternary Model Partitioning
Zhongshu Gu
Heqing Huang
Jialong Zhang
D. Su
Hani Jamjoom
Ankita Lamba
Dimitrios E. Pendarakis
Ian Molloy
21
53
0
03 Jul 2018
Copycat CNN: Stealing Knowledge by Persuading Confession with Random
  Non-Labeled Data
Copycat CNN: Stealing Knowledge by Persuading Confession with Random Non-Labeled Data
Jacson Rodrigues Correia-Silva
Rodrigo Berriel
C. Badue
Alberto F. de Souza
Thiago Oliveira-Santos
MLAU
30
174
0
14 Jun 2018
Blind Justice: Fairness with Encrypted Sensitive Attributes
Blind Justice: Fairness with Encrypted Sensitive Attributes
Niki Kilbertus
Adria Gascon
Matt J. Kusner
Michael Veale
Krishna P. Gummadi
Adrian Weller
28
149
0
08 Jun 2018
ML-Leaks: Model and Data Independent Membership Inference Attacks and
  Defenses on Machine Learning Models
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models
A. Salem
Yang Zhang
Mathias Humbert
Pascal Berrang
Mario Fritz
Michael Backes
MIACV
MIALM
65
929
0
04 Jun 2018
Defending Against Machine Learning Model Stealing Attacks Using
  Deceptive Perturbations
Defending Against Machine Learning Model Stealing Attacks Using Deceptive Perturbations
Taesung Lee
Ben Edwards
Ian Molloy
D. Su
AAML
20
40
0
31 May 2018
Gradient-Leaks: Understanding and Controlling Deanonymization in
  Federated Learning
Gradient-Leaks: Understanding and Controlling Deanonymization in Federated Learning
Tribhuvanesh Orekondy
Seong Joon Oh
Yang Zhang
Bernt Schiele
Mario Fritz
PICV
FedML
359
37
0
15 May 2018
Exploiting Unintended Feature Leakage in Collaborative Learning
Exploiting Unintended Feature Leakage in Collaborative Learning
Luca Melis
Congzheng Song
Emiliano De Cristofaro
Vitaly Shmatikov
FedML
93
1,457
0
10 May 2018
Semantic Adversarial Deep Learning
Semantic Adversarial Deep Learning
S. Seshia
S. Jha
T. Dreossi
AAML
SILM
27
90
0
19 Apr 2018
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and
  Performant Smart Contract Execution
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution
Raymond Cheng
Fan Zhang
Jernej Kos
Warren He
Nicholas Hynes
Noah M. Johnson
Ari Juels
Andrew K. Miller
D. Song
33
365
0
14 Apr 2018
Security Theater: On the Vulnerability of Classifiers to Exploratory
  Attacks
Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks
Tegjyot Singh Sethi
M. Kantardzic
J. Ryu
AAML
23
11
0
24 Mar 2018
A Dynamic-Adversarial Mining Approach to the Security of Machine
  Learning
A Dynamic-Adversarial Mining Approach to the Security of Machine Learning
Tegjyot Singh Sethi
M. Kantardzic
Lingyu Lyu
Jiashun Chen
AAML
16
11
0
24 Mar 2018
Technical Report: When Does Machine Learning FAIL? Generalized
  Transferability for Evasion and Poisoning Attacks
Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
Octavian Suciu
R. Marginean
Yigitcan Kaya
Hal Daumé
Tudor Dumitras
AAML
46
287
0
19 Mar 2018
Scalable Private Learning with PATE
Scalable Private Learning with PATE
Nicolas Papernot
Shuang Song
Ilya Mironov
A. Raghunathan
Kunal Talwar
Ulfar Erlingsson
52
607
0
24 Feb 2018
The Secret Sharer: Evaluating and Testing Unintended Memorization in
  Neural Networks
The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks
Nicholas Carlini
Chang-rui Liu
Ulfar Erlingsson
Jernej Kos
D. Song
89
1,120
0
22 Feb 2018
Federated Meta-Learning with Fast Convergence and Efficient
  Communication
Federated Meta-Learning with Fast Convergence and Efficient Communication
Fei Chen
Mi Luo
Zhenhua Dong
Zhenguo Li
Xiuqiang He
FedML
34
389
0
22 Feb 2018
DARTS: Deceiving Autonomous Cars with Toxic Signs
DARTS: Deceiving Autonomous Cars with Toxic Signs
Chawin Sitawarin
A. Bhagoji
Arsalan Mosenia
M. Chiang
Prateek Mittal
AAML
37
233
0
18 Feb 2018
Stealing Hyperparameters in Machine Learning
Stealing Hyperparameters in Machine Learning
Binghui Wang
Neil Zhenqiang Gong
AAML
63
458
0
14 Feb 2018
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
Battista Biggio
Fabio Roli
AAML
40
1,391
0
08 Dec 2017
Hardening Quantum Machine Learning Against Adversaries
Hardening Quantum Machine Learning Against Adversaries
N. Wiebe
Ramnath Kumar
AAML
25
20
0
17 Nov 2017
Towards Reverse-Engineering Black-Box Neural Networks
Towards Reverse-Engineering Black-Box Neural Networks
Seong Joon Oh
Maximilian Augustin
Bernt Schiele
Mario Fritz
AAML
292
3
0
06 Nov 2017
PassGAN: A Deep Learning Approach for Password Guessing
PassGAN: A Deep Learning Approach for Password Guessing
Briland Hitaj
Paolo Gasti
G. Ateniese
Fernando Perez-Cruz
GAN
30
246
0
01 Sep 2017
Certified Defenses for Data Poisoning Attacks
Certified Defenses for Data Poisoning Attacks
Jacob Steinhardt
Pang Wei Koh
Percy Liang
AAML
33
748
0
09 Jun 2017
Adversarial Learning: A Critical Review and Active Learning Study
Adversarial Learning: A Critical Review and Active Learning Study
David J. Miller
Xinyi Hu
Zhicong Qiu
G. Kesidis
AAML
11
23
0
27 May 2017
Evading Classifiers by Morphing in the Dark
Evading Classifiers by Morphing in the Dark
Hung Dang
Yue Huang
E. Chang
AAML
34
121
0
22 May 2017
Ensemble Adversarial Training: Attacks and Defenses
Ensemble Adversarial Training: Attacks and Defenses
Florian Tramèr
Alexey Kurakin
Nicolas Papernot
Ian Goodfellow
Dan Boneh
Patrick McDaniel
AAML
97
2,704
0
19 May 2017
DeepXplore: Automated Whitebox Testing of Deep Learning Systems
DeepXplore: Automated Whitebox Testing of Deep Learning Systems
Kexin Pei
Yinzhi Cao
Junfeng Yang
Suman Jana
AAML
48
1,354
0
18 May 2017
The Space of Transferable Adversarial Examples
The Space of Transferable Adversarial Examples
Florian Tramèr
Nicolas Papernot
Ian Goodfellow
Dan Boneh
Patrick McDaniel
AAML
SILM
41
555
0
11 Apr 2017
Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial
  Domains
Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains
Tegjyot Singh Sethi
M. Kantardzic
AAML
27
49
0
23 Mar 2017
Deep Models Under the GAN: Information Leakage from Collaborative Deep
  Learning
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
Briland Hitaj
G. Ateniese
Fernando Perez-Cruz
FedML
63
1,380
0
24 Feb 2017
Previous
12345678
Next